-
1
-
-
84905239482
-
-
Bachelor's thesis, Darmstadt University of Applied Sciences, Faculty of Computer Science, Darmstadt
-
Abt, S., (2009), "A statistical approach to flow-based network attack detection", Bachelor's thesis, Darmstadt University of Applied Sciences, Faculty of Computer Science, Darmstadt.
-
(2009)
A Statistical Approach to Flow-based Network Attack Detection
-
-
Abt, S.1
-
2
-
-
63749121916
-
A distributed framework for passive worm detection and throttling in p2p networks
-
Adeel, M., Tokarchuk, L., Cuthbert, L., Feng, C.S., and Qin, Z.G., (2009), "A distributed framework for passive worm detection and throttling in p2p networks", in Proceedings of the 6th IEEE Consumer Communications and Networking Conference, pp. 1-5.
-
(2009)
Proceedings of the 6th IEEE Consumer Communications and Networking Conference
, pp. 1-5
-
-
Adeel, M.1
Tokarchuk, L.2
Cuthbert, L.3
Feng, C.S.4
Qin, Z.G.5
-
3
-
-
84905242746
-
-
Arbor Networks, Inc., last accessed: January 2012
-
Arbor Networks, (2005-2011), Worldwide Infrastructure Security Report, Arbor Networks, Inc., http://www.arbornetworks.com/report (last accessed: January 2012).
-
(2005)
Worldwide Infrastructure Security Report
-
-
-
4
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
RAID 2006
-
Baecher, P., Koetter, M., Holz, T., and Dornseif, M., (2006), "The nepenthes platform: An efficient approach to collect malware", in Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006).
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
-
5
-
-
66249147541
-
A survey of botnet technology and defenses
-
Bailey, M., Cooke, E., Jahanian, F., Xu, Y., and Karir, M., (2009), "A survey of botnet technology and defenses", in Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 299-304.
-
(2009)
Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
7
-
-
67649996622
-
-
last accessed: January 2012
-
Cisco Systems, (2007), "Netflow Services Solutions Guide", http://www.cisco.com/en/US/docs/ios/solutionsdocs/netflow/nfwhite.html (last accessed: January 2012).
-
(2007)
Netflow Services Solutions Guide
-
-
-
8
-
-
70450206702
-
Specification of the IP flow information export (IPFIX) protocol for the exchange of ip traffic flow information
-
Editor
-
Claise, B. (Editor), (2008), "Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information", RFC 5101, http://tools.ietf.org/html/rfc5101.
-
(2008)
RFC
, vol.5101
-
-
Claise, B.1
-
11
-
-
70449466618
-
A survey of botnet and botnet detection
-
Feily, M., Shahrestani, A., and Ramadass, S., (2009), "A survey of botnet and botnet detection", in Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268-273.
-
(2009)
Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
14
-
-
84905271489
-
-
Diploma thesis, RWTH Aachen University, Department of Computer Science, Aachen
-
Gorecki, C., (2007), "Trumanbox - improving malware analysis by simulating the internet", Diploma thesis, RWTH Aachen University, Department of Computer Science, Aachen.
-
(2007)
Trumanbox - Improving Malware Analysis by Simulating the Internet
-
-
Gorecki, C.1
-
16
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., and Lee, W., (2007), "Bothunter: Detecting malware infection through ids-driven dialog correlation", in Proceedings of the 16th USENIX Security Symposium, pp. 167-182.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
18
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
Us
-
Gu, G., Perdisci, R., Zhang, J., and Lee, W., (2008b), "Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection", Usenix Security Symposium.
-
(2008)
Enix Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
19
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Karasaridis, A., Rexroad, B., and Hoeflin, D., (2007), "Wide-scale botnet detection and characterization", in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
20
-
-
77951447962
-
Botnet: Survey and case study
-
Li, C., Jiang, W., and Zou, X., (2009), "Botnet: Survey and case study", in Proceedings of the International Conference on Innovative Computing, Information and Control, pp. 1184-1187.
-
(2009)
Proceedings of the International Conference on Innovative Computing, Information and Control
, pp. 1184-1187
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
21
-
-
70449412215
-
Botnet: Classification, attacks, detection, tracing, and preventive measures
-
Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., and Zhang, J., (2009), "Botnet: Classification, attacks, detection, tracing, and preventive measures", in EURASIP Journal on Wireless Communications and Networking, Vol. 2009.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
, vol.2009
-
-
Liu, J.1
Xiao, Y.2
Ghaboosi, K.3
Deng, H.4
Zhang, J.5
-
25
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N., (2007), "The ghost in the browser analysis of web-based malware", in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp. 4-4.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 4-4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
30
-
-
41949115980
-
Detecting botnets with tight command and control
-
Strayer, W., Walsh, R., Livadas, C., and Lapsley, D., (2006), "Detecting botnets with tight command and control", in Proceedings of the 31st IEEE Conference on Local Computer Networks.
-
(2006)
Proceedings of the 31st IEEE Conference on Local Computer Networks
-
-
Strayer, W.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
31
-
-
26844548971
-
-
last accessed: January 2012
-
The Honeynet Project, (2005), "Know your enemy: Tracking botnets", http://www.honeynet.org/(last accessed: January 2012).
-
(2005)
Know your Enemy: Tracking Botnets
-
-
-
32
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
Thing, V., Sloman, M., Dulay, N., Venter, H., Eloff, M., Labuschagne, L., Eloff, J., and VonSolms, R., (2007), "A survey of bots used for distributed denial of service attacks, " IFIP International Federation for Information Processing, vol. 232, pp. 229.
-
(2007)
IFIP International Federation for Information Processing
, vol.232
, pp. 229
-
-
Thing, V.1
Sloman, M.2
Dulay, N.3
Venter, H.4
Eloff, M.5
Labuschagne, L.6
Eloff, J.7
VonSolms, R.8
|